This work was influenced the separation and preconcentration steps were carried out to determination of metformin (MET) in pharmaceutical preparations and human serum samples. Complex formation method and cloud-point extraction (CPE) coupling with UV-Visible spectrophotometry were used to investigated of study target.The results has showed the best optical characteristic for calibration curve and statistical data which were obtained under optimum conditions. The first method is based on the reaction of MET with nickel (II) in alkaline medium an absorption maximum ?)max) at 434nm. ''Beer's low'' is obeyed in the concentration range (10-100µg.ml-1) with molar absorptivity of 3.9x103 L.mol-1.cm-1.The limit of detection and quantitation values were 2.37 and7.11 µg.ml-1 respectively. The second method based on extraction of traces amounts of MET using the cloud-point extraction (CPE). This method implicated for using of a nonionic surfactant (Triton x-114) as an extraction medium which was entrap the hydrophobic complex formed between MET and nickel(ii) in basic medium as reaction system for designing the CPE procedure. The optimum conditions were similar the first method expect the amount of surfactant which was 0.5 ml. The concentrations range of calibration curve from 3.5to100 µg.ml-1 and molar absorptivity of 1.2x104 L.mol-1.cm-1. In this method was access to less of concentrations in Limit of detection and quantitation which were 0.74and 2.22 µg.ml-1 respectively. The precise (RSD %) and accuracy (recovery %) of both methods were ranged between 0.24-0.47, 97.86-98.68 respectively. The data of two methods were appeared high acceptable with standered of British Pharmacopoeia through using statistic methods (f-test and t-test), that they may be used in analysis of MET.
Visible Light Communication (VLC) has emerged as a powerful technique for wireless communication systems. Providing high data rate and increasing capacity are the major problems in VLC. Recent evidence suggests that Multiple Input Multiple Output (MIMO) technique can offers improved data rates and increased link range. This paper describes the design and implementation of visible light communication system in indoor environment exploring the benefits of MIMO. The specific objective of this research was to implement a 4× 4 Multiple Input (LEDs) Multiple Output (photodetectors)-VLC communication system, where a 16 white power LEDs in four arrays are setting up at transmitter and four RX modules are setting up at receiver side without the nee
... Show MoreThe study is based on the selective binding ability of the drug compound procaine (PRO) on a surface imprinted with nylon 6 (N6) polymer. Physical characterization of the polymer template was performed by X-ray diffraction and DSC thermal analysis. The imprinted polymer showed a high adsorption capacity to trap procaine (237 µg/g) and excellent recognition ability with an imprinted factor equal to 3.2. The method was applied to an extraction column simulating a solid-phase extraction to separate the drug compound in the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate more than the presence of tinoxicam and nucleosimide separately and in a mixture of them with a recovery rate of more t
... Show MoreThe gas chromatography (GC) method in analytical chemistry is a quick and accurate method to detect volatile components like ethanol. A method for determining volatile components known as Headspace chromatography (HS-GC) was developed along with an internal standard method (ISM) to identify ethanol in fermented broth in the laboratory. The aim of this research is determining the concentration of ethanol in fermented broth using capillary column (ZB-1). This method can analyze ethanol concentrations in the fermented medium broth ranging from 10 to 200 g/L. The validation of this method was done in order to obtain the results to be of high precision and the significant, precision was represented as the relative standard deviation (RSD) which
... Show MoreIn this work, a modified water displacement method (MWDM) was designed and used alongside geometry method (GEM), overflow method (OFM) and water displacement method (WDM) for determination of bulk volume of a porous solid. Their results were analyzed graphically and statistically. On testing against the data obtained by Suspension/Buoyancy Method (SBM) used as gold standard, it was found that only those generated by the modified water displacement method (MWDM) were of very high accuracy and precision. Apart from its reproducibility being within the recommended range for acceptability of a test method, the technique is cost-effective and easy to apply even with an ungraduated glass cylindrical tube. This can go a long way in enhancing th
... Show MoreIn current study a computation fluid dynamic (CFD) technique was used to investigate the effect of groynes shape and spacing on the scour pattern and the maximum scour depth in open channel flow. CFD model have been validated throughout comparing the numerical results with three previous experimental studies for a single groyne located in open channel with three different shapes (L, quadrant, and parabola shapes). The comparison revealed very good agreement between numerical results of the maximum scour depth with the results of all experimental models. Moreover, investigations of the effect of multi-groynes (three groynes and four groynes) arranged in parallel with constant spacing and also with variable spacing have been done, the
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreIn this work, the theoretical study for designing of dielectric mirrors of high reflectance in the visible region of electromagnetic spectrum between wavelength of 400-700 nm is presented, and searching on the performance properties of the design, like there reflectance as a function to the wavelength, as beam incident in a normal form, for the materials of neglected absorbance, and scattering, in the form of thin film deposition, which are deposited on glass substrate, and by using matrix system in the study, which are used as computer simulation in MATLAB code. The materials which are used in this study are represented by ( AlAs ), (TiO2 ),( SiC ), and (Si3N4 ), which used in the designing mirrors alter
... Show MoreGeomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MorePeripheral neuropathy represents one of the common diabetic complications in patients with diabetes mellitus type 2 (DMT2). Peripheral neuropathy affects the feet, legs, hands, and arms. It was found that one-third to one-half of diabetics have peripheral neuropathy. The current study aimed to evaluate the level of visfatin in diabetic patient groups with or without peripheral neuropathy in comparison with healthy subjects to knowledge whether visfatin can be applied as a predictor factor for this type of disease complication. The study included 120 males and females ranging in age from 40 to 97 years old. (40 patients with type 2 diabetes, 40 patients with diabetic peripheral neuropathy, and 40 healthy people served as the control group
... Show More